Protecting Flow Design for DoS Attack and Defense at the MAC Layer in Mobile Ad Hoc Network

被引:0
作者
Su, Jian [1 ]
Liu, Huining [2 ]
机构
[1] Guangxi Sci & Technol Project Evaluat Ctr, Nanning 530022, Peoples R China
[2] Guangxi Sci & Technol Dept, Nanning 530012, Peoples R China
来源
2010 THE 3RD INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND INDUSTRIAL APPLICATION (PACIIA2010), VOL I | 2010年
关键词
Ad Hoc Networks; MAC Layer; DoS attack; Protecting Flow;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper discusses possible DoS attacks induced by IEEE 802.11 in wireless Ad hoc networks. The protecting flow based solutions are emphatically analyzed with respect to CCA(Colluding adversaries attack) DoS attack at MAC layer. This paper proposes the principles of protecting flow design. By placing protecting flows in different positions, we compared the throughput and delay of these flows being attacked. Simulation results show that the design rule of protecting flow is effective and applicable.
引用
收藏
页码:143 / 146
页数:4
相关论文
共 50 条
[31]   Design of MAC Protocols for Underwater Acoustic Ad Hoc Networks [J].
Lu, Li ;
Zhong, Liu ;
Ke, Li .
WISM: 2009 INTERNATIONAL CONFERENCE ON WEB INFORMATION SYSTEMS AND MINING, PROCEEDINGS, 2009, :471-474
[32]   Cross Layer Design Approach to Enhance the Quality of Service in Mobile Ad Hoc Networks [J].
Attada, Venkataramana ;
Setty, S. Pallam .
WIRELESS PERSONAL COMMUNICATIONS, 2015, 84 (01) :305-319
[33]   An approach to mitigate DoS attack based on routing misbehavior in wireless ad hoc networks [J].
Gunhee Lee ;
Wonil Kim ;
Kangseok Kim ;
Sangyoon Oh ;
Dong-kyoo Kim .
Peer-to-Peer Networking and Applications, 2015, 8 :684-693
[34]   Cross Layer Design Approach to Enhance the Quality of Service in Mobile Ad Hoc Networks [J].
Venkataramana Attada ;
S. Pallam Setty .
Wireless Personal Communications, 2015, 84 :305-319
[35]   An approach to mitigate DoS attack based on routing misbehavior in wireless ad hoc networks [J].
Lee, Gunhee ;
Kim, Wonil ;
Kim, Kangseok ;
Oh, Sangyoon ;
Kim, Dong-kyoo .
PEER-TO-PEER NETWORKING AND APPLICATIONS, 2015, 8 (04) :684-693
[36]   Clusterhead election for mobile ad hoc wireless network [J].
Liang, QL .
PIMRC 2003: 14TH IEEE 2003 INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR AND MOBILE RADIO COMMUNICATIONS PROCEEDINGS, VOLS 1-3 2003, 2003, :1623-1628
[37]   Mobility and reliability modeling for a mobile ad hoc network [J].
Cook, Jason L. ;
Ramirez-Marquez, Jose Emmanuel .
IIE TRANSACTIONS, 2009, 41 (01) :23-31
[38]   Review on cross-layer design for cognitive ad-hoc and sensor network [J].
Singhal, Chetna ;
Rajesh, A. .
IET COMMUNICATIONS, 2020, 14 (06) :897-909
[39]   A unified MAC layer framework for ad-hoc networks with smart antennas [J].
Sundaresan, Karthikeyan ;
Sivakumar, Raghupathy .
IEEE-ACM TRANSACTIONS ON NETWORKING, 2007, 15 (03) :546-559
[40]   Cross-layer cooperation to handle MAC misbehavior in ad hoc networks [J].
Guang, Lei ;
Assi, Chadi .
2006 CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING, VOLS 1-5, 2006, :194-+